June 19, 2023, 11 a.m. | Wild West Hackin' Fest

Wild West Hackin' Fest www.youtube.com

Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Macro-laced Word documents, malicious HTAs, dumping LSASS, WMI, and Kerberoasting – the bread-and-butter of offensive security. Rarely do binary exploits fall under the purview of “standard” offensive toolkits. Why is this? This talk looks into contemporary exploit mitigations on Windows, such as control-flow integrity and code-signing, and how they affect the cost of developing exploits in today’s age. “Point-and-click” exploits …

age binary bread click code control cost documents dumping exploit exploits flow integrity lsass macro malicious mitigations offensive offensive security point security signing standard under windows wmi word

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada